Publications

Export 7 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Aslanyan Z., Nielson F..  2015.  Pareto Efficient Solution of Attack-Defence Trees. 4th International Conference on Principles of Security and Trust, POST 2015, London, UK. 9036:95–114.
Bullee J.H, Montoya L., Pieters W., Junger M., Hartel P.H.  2015.  The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology. 11:97–115.
Junger M., Morales A.LMontoya, Overink F.J.  2017.  Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior. 66:75–87.
Chen T., Kammueller F., Nemli I., Probst C.W.  2015.  A Probabilistic Analysis Framework for Malicious Insider Threats. Third International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Los Angeles, US. 9190:178–189.
Kordy B., Pouly M., Schweizer P..  2014.  A Probabilistic Framework for Security Scenarios with Dependent Actions. 11th International Conference on Integrated Formal Methods, IFM 2014, Bertinoro, Italy. 8739:256–271.
Kordy B., Pouly M., Schweitzer P..  2016.  Probabilistic reasoning with graphical security models. Information sciences. 342:111–131.
Kordy B., Mauw S., Pieters W..  2014.  Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. EPTCS. 148